5GB_24x24accreditation-icons_Certificateaccreditation-icons_Coursesaccreditation-icons_Datasheetaccreditation-icons_Filesaccreditation-icons_Formaccreditation-icons_Spreadsheetadd-cartalertarrow-downarrow-left-amarantharrow-leftarrow-right-amarantharrow-rightarrow-upblended-learningcalendarcalendar2cardcartcertification-simplechatcheck-circle-outlinecheckchevron-leftchevron-rightclass-connectclassroom-liveclipboardcpfdeletedigital-learningdloaddotDownload_on_the_App_Store_Badge_US-UK_RGB_wht_092917_2021-10-12-171400_chioDownload_on_the_App_Store_Badgedropdowneditemailengagementenvelopefacebookgeneral-icons_alert-icon-newgeneral-icons_content-spotlight-icongeneral-icons_Government-icongeneral-icons_Keynote-lightning-talks-icongeneral-icons_skills-of-tomorrow-icongeneral-icons_think-different-iconglassdoor-icon-01Google_Play_Store_badge_ENgoogleplusgradcap-icon-01gridicon_Calendar2_blueicon_Collaboration_blueicon_Woman6_BLUEicon-clipboardiconmonstr-globe-thininfinityinfo-2infoinstagramlabellabslargest-training-companylate-availabilitylinkedinlist-2listlockminuson-demandpencilphonephone2pinterestplay-2playplus-circle-outlineplusprivate-group-trainingprivate-trainingquoterecordingsrefreshResources_Demo-amaranthResources_DemoResources_ebooksResources_GuidesResources_ListicleResources_PodcastResources_Research-RepoertResources_Video-TestimonialResources_WebinarResources_White-papersearchskillsoft-icons_Accelerate-Learning-amaranthskillsoft-icons_Accelerate-Learningskillsoft-icons_ArrowsSkillsoft-icons_Blogskillsoft-icons_Charityskillsoft-icons_Clockskillsoft-icons_Cloudskillsoft-icons_Complianceskillsoft-icons_Courses-amaranthskillsoft-icons_Coursesskillsoft-icons_Demonstrate-Learning-amaranthskillsoft-icons_Demonstrate-Learningskillsoft-icons_Developmentskillsoft-icons_ebooksskillsoft-icons_Employee-Referralskillsoft-icons_Engagement-amaranthskillsoft-icons_Engagementskillsoft-icons_Eventskillsoft-icons_Find-Content-amaranthskillsoft-icons_Find-Contentskillsoft-icons_Free-Beverageskillsoft-icons_Free-Snackskillsoft-icons_Giftskillsoft-icons_Globe-Complianceskillsoft-icons_Grad-Capskillsoft-icons_Gradcap-amaranthskillsoft-icons_Gradcapskillsoft-icons_Gymskillsoft-icons_Keynoteskillsoft-icons_Leadership-Devskillsoft-icons_Leadershipskillsoft-icons_Learner-Centered-Designskillsoft-icons_lightbulbskillsoft-icons_Lightning-Talksskillsoft-icons_Live-Learning-amaranthskillsoft-icons_Live-Learningskillsoft-icons_Lunch-Pizzaskillsoft-icons_Media-Coverageskillsoft-icons_Mobile-Devicesskillsoft-icons_Paid-Vacationskillsoft-icons_peopleskillsoft-icons_Percipioskillsoft-icons_Personalized-Experience-amaranthskillsoft-icons_Personalized-Experienceskillsoft-icons_Press-Releaseskillsoft-icons_Recognitionskillsoft-icons_Rocketshipskillsoft-icons_serverskillsoft-icons_Sumtotalskillsoft-icons_Technologyskillsoft-icons_Think-Differentskillsoft-icons_Video-amaranthskillsoft-icons_Videoskillsoft-icons_Volunteerskillsoft-icons_Wellnessslider-arrow-leftslider-arrow-rightspecial-offersstudent-satisfactiontimetwitterunique-coursesuservcview-coursesvirtual-classroomvirtual-plus-classroomx-circlexyoutube
Skip to main Content

EC-Council Certified Encryption Specialist (ECES) + Exam voucher

  • Course Code ECES
  • Duration 3 days

Course Delivery

Public Classroom Price

Please call

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Elearning (Self-paced)

    Self paced electronic learning

  • Public Classroom

    Traditional Classroom Learning

Request this course in a different delivery format.

Course Overview

Top

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

Overview of other algorithms such as Blowfish, Twofish, and Skipjack
Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.

Participants will also be provided a practical application of the following:

How to set up a VPN
Encrypt a drive
Hands-on experience with steganography
Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 20-22 January, 2025
    • Location: Virtual
    • Delivery Format: Virtual Learning
    • Date: 17-19 March, 2025
    • Location: Virtual

Target Audience

Top

Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Course Objectives

Top

What is Cryptography?
History
Mono-Alphabet Substitution
Caesar Cipher
Atbash Cipher
ROT 13
Scytale
Single Substitution Weaknesses
Multi-Alphabet Substitution
Cipher Disk
Vigenère Cipher
Vigenère Cipher: Example
Breaking the Vigenère Cipher
Playfair
The ADFGVX cipher
The Enigma Machine
CrypTool


 

Course Content

Top

Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies

Test Certification

Top
Number of Questions:50Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery:EC-Council Exam Center (ECC EXAM)
Course/Class Duration: 3 days / 20 hours